“I recall being four years old in a village. The village was...
20 October 2024
Changing the Meaning of Processes and Challenges
In what situations and on which topics are we told that we...
14 December 2021
COM Hijacking for Persistence
COM Object? The Microsoft Component Object Model (COM) is an interface standard...
17 September 2020
Ratelimit Bypass Tool: Whitepass
Cyber Struggle Delta Team has developed a tool to bypass Whitelist/Ratelimit Implementations in...
22 July 2020
Credential Dumping Tool: Chalumeau
Cyber Struggle Delta Team has developed a tool to help penetration testers...
21 April 2020
Microsoft ATA Evasion (Over PTH, Golden Ticket)
Introduction During these quarantine times, our team focusses on creating new updated...
Vulnerability descriptionThis morning, Microsoft released patches for CVE-2020-0796 SMBv3 RCE Microsoft’s advisory...
6 February 2020
Intelligence Planning
The discipline of “Intelligence” is often assumed to be practiced only by...
3 February 2020
Symantec Endpoint Protection Bypass + Meterpreter Pivoting
Introduction In Red Teaming, it is essential to keep your tactical, mechanical...
14 January 2020
FireEye EDR Bypassed with Basic Process Injection
Introduction During our SOC and Red Team researches, we like to give...